SlideShare a Scribd company logo
1 of 11
OSI Layer Model
Physical Layer
• The lowest layer of the OSI reference model.
• Responsible for the actual physical connection between the devices.
• Contains information in the form of bits.
• When receiving data, this layer will get the signal received and convert it into 0s and 1s
and send them to the Data Link layer, which will put the frame back together.
• Functions:
• Bit synchronization: The physical layer provides the synchronization of the bits by providing
a clock. This clock controls both sender and receiver thus providing synchronization at bit
level.
• Bit rate control: The Physical layer also defines the transmission rate i.e. the number of bits
sent per second.
• Physical topologies: Physical layer specifies the way in which the different, devices/nodes are
arranged in a network i.e. bus, star or mesh topology.
• Transmission mode: Physical layer also defines the way in which the data flows between the
two connected devices. The various transmission modes possible are: Simplex, half-duplex and
full-duplex.
Data Link Layer
• Responsible for the node to node delivery of the message.
• Main function is to make sure data transfer is error free from one node to another, over
the physical layer.
• When a packet arrives in a network, it is the responsibility of DLL to transmit it to the
Host using its MAC address.
• Data Link Layer is divided into two sub layers :
• Logical Link Control (LLC)
• Media Access Control (MAC)
• The packet received from Network layer is further divided into frames depending on the
frame size of NIC(Network Interface Card). DLL also encapsulates Sender and
Receiver’s MAC address in the header.
• The Receiver’s MAC address is obtained by placing an ARP(Address Resolution
Protocol) request onto the wire asking “Who has that IP address?” and the destination
host will reply with its MAC address.
Data Link Layer
• Functions
• The functions of the data Link layer are :
• Framing: Framing is a function of the data link layer. It provides a way for a sender to
transmit a set of bits that are meaningful to the receiver. This can be accomplished by attaching
special bit patterns to the beginning and end of the frame.
• Physical addressing: After creating frames, Data link layer adds physical addresses (MAC
address) of sender and/or receiver in the header of each frame.
• Error control: Data link layer provides the mechanism of error control in which it detects and
retransmits damaged or lost frames.
• Flow Control: The data rate must be constant on both sides else the data may get corrupted
thus , flow control coordinates that amount of data that can be sent before receiving
acknowledgement.
• Access control: When a single communication channel is shared by multiple devices, MAC
sub-layer of data link layer helps to determine which device has control over the channel at a
given time.
Network Layer
• Works for the transmission of data from one host to the other located in different
networks.
• It also takes care of packet routing i.e. selection of the shortest path to transmit
the packet, from the number of routes available.
• The sender & receiver’s IP address are placed in the header by network layer.
• Functions:
• Routing: The network layer protocols determine which route is suitable from source
to destination. This function of network layer is known as routing.
• Logical Addressing: In order to identify each device on internetwork uniquely,
network layer defines an addressing scheme. The sender & receiver’s IP address are
placed in the header by network layer. Such an address distinguishes each device
uniquely and universally.
• Segment in Network layer is referred as Packet.
Transport Layer
• Provides services to application layer and takes services from network layer.
• The data in the transport layer is referred to as Segments. It is responsible for the
End to End delivery of the complete message.
• Transport layer also provides the acknowledgment of the successful data
transmission and re-transmits the data if an error is found.
• Functions:
• Segmentation and Reassembly: This layer accepts the message from the (session)
layer , breaks the message into smaller units . Each of the segment produced has a
header associated with it. The transport layer at the destination station reassembles the
message.
• Service Point Addressing: In order to deliver the message to correct process,
transport layer header includes a type of address called service point address or port
address. Thus by specifying this address, transport layer makes sure that the message
is delivered to the correct process.
Transport Layer
• Services provided by transport layer :
• Connection Oriented Service: It is a three-phase process which include
– Connection Establishment
– Data Transfer
– Termination / disconnection
In this type of transmission, the receiving device sends an acknowledgment, back to
the source after a packet or group of packet is received. This type of transmission is
reliable and secure.
• Connection less service: It is a one phase process and includes Data Transfer. In this
type of transmission, the receiver does not acknowledge receipt of a packet. This
approach allows for much faster communication between devices. Connection
oriented Service is more reliable than connection less Service.
• Data in the Transport Layer is called as Segments.
• Transport Layer is called as Heart of OSI model.
Session Layer
• Responsible for establishment of connection, maintenance of sessions, authentication and
also ensures security.
• Functions:
• Session establishment, maintenance and termination: The layer allows the two processes to
establish, use and terminate a connection.
• Synchronization : This layer allows a process to add checkpoints which are considered as
synchronization points into the data. These synchronization point help to identify the error so
that the data is re-synchronized properly, and ends of the messages are not cut prematurely and
data loss is avoided.
• Dialog Controller : The session layer allows two systems to start communication with each
other in half-duplex or full-duplex.
• Let’s consider a scenario where a user wants to send a message through some Messenger
application running in his browser. The “Messenger” here acts as the application layer
which provides the user with an interface to create the data. This message or so-called
Data is compressed, encrypted (if any secure data) and converted into bits (0’s and 1’s) so
that it can be transmitted.
Presentation Layer
• Presentation layer is also called the Translation layer.
• The data from the application layer is extracted here and manipulated as per the
required format to transmit over the network.
• Functions:
• Translation : For example, ASCII to EBCDIC.
• Encryption/ Decryption : Data encryption translates the data into another form or
code. The encrypted data is known as the cipher text and the decrypted data is known
as plain text. A key value is used for encrypting as well as decrypting data.
• Compression: Reduces the number of bits that need to be transmitted on the network.
Application Layer
• At the very top of the OSI Reference Model stack of layers, we find Application
layer which is implemented by the network applications.
• These applications produce the data, which has to be transferred over the
network. This layer also serves as a window for the application services to access
the network and for displaying the received information to the user.
• Ex: Application – Browsers, Skype Messenger etc.
• Application Layer is also called as Desktop Layer.
• Functions:
• Network Virtual Terminal
• FTAM-File transfer access and management
• Mail Services
• Directory Services
Osi layer model

More Related Content

What's hot (20)

COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link Layer
 
Computer networks-3
Computer networks-3Computer networks-3
Computer networks-3
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
 
Osi model
Osi modelOsi model
Osi model
 
Computer networks-2
Computer networks-2Computer networks-2
Computer networks-2
 
ITFT_Data Link Layer issues
ITFT_Data Link Layer  issuesITFT_Data Link Layer  issues
ITFT_Data Link Layer issues
 
Project on wifi ,LTE and Broadband devices
Project on wifi ,LTE and Broadband devicesProject on wifi ,LTE and Broadband devices
Project on wifi ,LTE and Broadband devices
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Chapter 3 final
Chapter 3 finalChapter 3 final
Chapter 3 final
 
lecture 4.pptx
lecture 4.pptxlecture 4.pptx
lecture 4.pptx
 
Computer networks-1
Computer networks-1Computer networks-1
Computer networks-1
 
02 network models
02  network models02  network models
02 network models
 
Computer networks-4
Computer networks-4Computer networks-4
Computer networks-4
 
Network Fundamentals: OSI Model
Network Fundamentals: OSI Model Network Fundamentals: OSI Model
Network Fundamentals: OSI Model
 
Osi model
Osi modelOsi model
Osi model
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
 
Cn 317 1
Cn 317 1Cn 317 1
Cn 317 1
 
Class Note 01
Class Note 01Class Note 01
Class Note 01
 

Similar to Osi layer model

Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Zakirul Islam
 
Client Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxClient Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxDevChaudhari17
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocolNayan Sarma
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx183JAIDEEP
 
Networking for MBA
Networking for MBANetworking for MBA
Networking for MBAKK Bajpai
 
Network internet
Network internetNetwork internet
Network internetKumar
 
Networks internet
Networks internetNetworks internet
Networks internetKumar
 
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBapanKar2
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.pptssuserf7cd2b
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.pptssuserf7cd2b
 
open system interconnection referencemodel.ppt
open system interconnection referencemodel.pptopen system interconnection referencemodel.ppt
open system interconnection referencemodel.pptAnkitaAggarwal68
 
Presentation of computer network on data link layer
Presentation of computer network on data link layerPresentation of computer network on data link layer
Presentation of computer network on data link layersumit gyawali
 

Similar to Osi layer model (20)

Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 
tcpiposi.pptx
tcpiposi.pptxtcpiposi.pptx
tcpiposi.pptx
 
Client Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxClient Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptx
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
The OSI model
 The OSI model The OSI model
The OSI model
 
OSI MODEL.pptx
OSI MODEL.pptxOSI MODEL.pptx
OSI MODEL.pptx
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 
Networking for MBA
Networking for MBANetworking for MBA
Networking for MBA
 
Network internet
Network internetNetwork internet
Network internet
 
Networks internet
Networks internetNetworks internet
Networks internet
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Osi model
Osi modelOsi model
Osi model
 
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
ch5-osi.pdf
ch5-osi.pdfch5-osi.pdf
ch5-osi.pdf
 
open system interconnection referencemodel.ppt
open system interconnection referencemodel.pptopen system interconnection referencemodel.ppt
open system interconnection referencemodel.ppt
 
Presentation of computer network on data link layer
Presentation of computer network on data link layerPresentation of computer network on data link layer
Presentation of computer network on data link layer
 

More from IshworKhatiwada

Password Based Access Control System using Microcontroller
Password Based Access Control System using MicrocontrollerPassword Based Access Control System using Microcontroller
Password Based Access Control System using MicrocontrollerIshworKhatiwada
 
Operating system and installation
Operating system and  installationOperating system and  installation
Operating system and installationIshworKhatiwada
 
A CASE STUDY ALIBABA.COM
A CASE STUDY ALIBABA.COMA CASE STUDY ALIBABA.COM
A CASE STUDY ALIBABA.COMIshworKhatiwada
 

More from IshworKhatiwada (6)

8086 Microprocessor
8086 Microprocessor8086 Microprocessor
8086 Microprocessor
 
Password Based Access Control System using Microcontroller
Password Based Access Control System using MicrocontrollerPassword Based Access Control System using Microcontroller
Password Based Access Control System using Microcontroller
 
Report
ReportReport
Report
 
Differential equation
Differential equationDifferential equation
Differential equation
 
Operating system and installation
Operating system and  installationOperating system and  installation
Operating system and installation
 
A CASE STUDY ALIBABA.COM
A CASE STUDY ALIBABA.COMA CASE STUDY ALIBABA.COM
A CASE STUDY ALIBABA.COM
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

Osi layer model

  • 2. Physical Layer • The lowest layer of the OSI reference model. • Responsible for the actual physical connection between the devices. • Contains information in the form of bits. • When receiving data, this layer will get the signal received and convert it into 0s and 1s and send them to the Data Link layer, which will put the frame back together. • Functions: • Bit synchronization: The physical layer provides the synchronization of the bits by providing a clock. This clock controls both sender and receiver thus providing synchronization at bit level. • Bit rate control: The Physical layer also defines the transmission rate i.e. the number of bits sent per second. • Physical topologies: Physical layer specifies the way in which the different, devices/nodes are arranged in a network i.e. bus, star or mesh topology. • Transmission mode: Physical layer also defines the way in which the data flows between the two connected devices. The various transmission modes possible are: Simplex, half-duplex and full-duplex.
  • 3. Data Link Layer • Responsible for the node to node delivery of the message. • Main function is to make sure data transfer is error free from one node to another, over the physical layer. • When a packet arrives in a network, it is the responsibility of DLL to transmit it to the Host using its MAC address. • Data Link Layer is divided into two sub layers : • Logical Link Control (LLC) • Media Access Control (MAC) • The packet received from Network layer is further divided into frames depending on the frame size of NIC(Network Interface Card). DLL also encapsulates Sender and Receiver’s MAC address in the header. • The Receiver’s MAC address is obtained by placing an ARP(Address Resolution Protocol) request onto the wire asking “Who has that IP address?” and the destination host will reply with its MAC address.
  • 4. Data Link Layer • Functions • The functions of the data Link layer are : • Framing: Framing is a function of the data link layer. It provides a way for a sender to transmit a set of bits that are meaningful to the receiver. This can be accomplished by attaching special bit patterns to the beginning and end of the frame. • Physical addressing: After creating frames, Data link layer adds physical addresses (MAC address) of sender and/or receiver in the header of each frame. • Error control: Data link layer provides the mechanism of error control in which it detects and retransmits damaged or lost frames. • Flow Control: The data rate must be constant on both sides else the data may get corrupted thus , flow control coordinates that amount of data that can be sent before receiving acknowledgement. • Access control: When a single communication channel is shared by multiple devices, MAC sub-layer of data link layer helps to determine which device has control over the channel at a given time.
  • 5. Network Layer • Works for the transmission of data from one host to the other located in different networks. • It also takes care of packet routing i.e. selection of the shortest path to transmit the packet, from the number of routes available. • The sender & receiver’s IP address are placed in the header by network layer. • Functions: • Routing: The network layer protocols determine which route is suitable from source to destination. This function of network layer is known as routing. • Logical Addressing: In order to identify each device on internetwork uniquely, network layer defines an addressing scheme. The sender & receiver’s IP address are placed in the header by network layer. Such an address distinguishes each device uniquely and universally. • Segment in Network layer is referred as Packet.
  • 6. Transport Layer • Provides services to application layer and takes services from network layer. • The data in the transport layer is referred to as Segments. It is responsible for the End to End delivery of the complete message. • Transport layer also provides the acknowledgment of the successful data transmission and re-transmits the data if an error is found. • Functions: • Segmentation and Reassembly: This layer accepts the message from the (session) layer , breaks the message into smaller units . Each of the segment produced has a header associated with it. The transport layer at the destination station reassembles the message. • Service Point Addressing: In order to deliver the message to correct process, transport layer header includes a type of address called service point address or port address. Thus by specifying this address, transport layer makes sure that the message is delivered to the correct process.
  • 7. Transport Layer • Services provided by transport layer : • Connection Oriented Service: It is a three-phase process which include – Connection Establishment – Data Transfer – Termination / disconnection In this type of transmission, the receiving device sends an acknowledgment, back to the source after a packet or group of packet is received. This type of transmission is reliable and secure. • Connection less service: It is a one phase process and includes Data Transfer. In this type of transmission, the receiver does not acknowledge receipt of a packet. This approach allows for much faster communication between devices. Connection oriented Service is more reliable than connection less Service. • Data in the Transport Layer is called as Segments. • Transport Layer is called as Heart of OSI model.
  • 8. Session Layer • Responsible for establishment of connection, maintenance of sessions, authentication and also ensures security. • Functions: • Session establishment, maintenance and termination: The layer allows the two processes to establish, use and terminate a connection. • Synchronization : This layer allows a process to add checkpoints which are considered as synchronization points into the data. These synchronization point help to identify the error so that the data is re-synchronized properly, and ends of the messages are not cut prematurely and data loss is avoided. • Dialog Controller : The session layer allows two systems to start communication with each other in half-duplex or full-duplex. • Let’s consider a scenario where a user wants to send a message through some Messenger application running in his browser. The “Messenger” here acts as the application layer which provides the user with an interface to create the data. This message or so-called Data is compressed, encrypted (if any secure data) and converted into bits (0’s and 1’s) so that it can be transmitted.
  • 9. Presentation Layer • Presentation layer is also called the Translation layer. • The data from the application layer is extracted here and manipulated as per the required format to transmit over the network. • Functions: • Translation : For example, ASCII to EBCDIC. • Encryption/ Decryption : Data encryption translates the data into another form or code. The encrypted data is known as the cipher text and the decrypted data is known as plain text. A key value is used for encrypting as well as decrypting data. • Compression: Reduces the number of bits that need to be transmitted on the network.
  • 10. Application Layer • At the very top of the OSI Reference Model stack of layers, we find Application layer which is implemented by the network applications. • These applications produce the data, which has to be transferred over the network. This layer also serves as a window for the application services to access the network and for displaying the received information to the user. • Ex: Application – Browsers, Skype Messenger etc. • Application Layer is also called as Desktop Layer. • Functions: • Network Virtual Terminal • FTAM-File transfer access and management • Mail Services • Directory Services

Editor's Notes

  1. Hub, Repeater, Modem, Cables are Physical Layer devices.
  2. Switch & Bridge are Data Link Layer devices.
  3. Transport layer is operated by the Operating System. It is a part of the OS and communicates with the Application Layer by making system calls.
  4. **All the below 3 layers(including Session Layer) are integrated as a single layer in TCP/IP model as “Application Layer”. **Implementation of these 3 layers is done by the network application itself. These are also known as Upper Layers or Software Layers.
  5. **All the below 3 layers(including Session Layer) are integrated as a single layer in TCP/IP model as “Application Layer”. **Implementation of these 3 layers is done by the network application itself. These are also known as Upper Layers or Software Layers.
  6. **All the below 3 layers(including Session Layer) are integrated as a single layer in TCP/IP model as “Application Layer”. **Implementation of these 3 layers is done by the network application itself. These are also known as Upper Layers or Software Layers.